You are on page 1of 12

1.

8_____________________ is an interconnection of computers and computing devices using


either wires or radio waves over small or large geographic areas.

2. ___________ are connecting devices between LANs and WANs.

3. End devices are also referred to as __________

4. ____________ is the total time in seconds it takes to transfer data from source to its
destination.

5. One of the advantages of Network hubs is that it operates in half-duplex. True/False?

6. What type of link sends packets of data from a single source to all device connected on the
network?

7. Network bridges filter and forward data based on ___________________

8. Under a component of computer networks, _______________ encodes pattern of electrical


impulses, fiber optics encodes into _______________ and _______________ encodes pattern
of electromagnetic waves.

9. An intermediary device that connects segments within the same network is?

10. When Local Area Networks are used by companies, they are called ______________

11. Ordering books is an example of forms of E-commerce under what type of application?

12. One of the functions of the intermediary device is to generate and transmit signals.
True/False?

13. The standard for wireless LAN’s is called __________ popularly known as _____________

14. What type of networks are found in small offices or residences and are managed from a
single device?

15. Hubs filter and manage data. True/False?

16. Point-to-point transmission with exactly one sender and exactly one receiver is called
___________

17. The transfer of digital or analog data using digital or analog signals refers to _____________

18. It is easier to send signals through the air than through a fiber or over a wire. True/False?
19. What provides the channel over which message travels from source to destination?

20. A _________ device is either the source or destination of a message.

21. The standard for wired LANs is known as _______________

22. What links together devices so that data and information can be shared among them?

23. The internet uses ________ networks to connect enterprise networks, home networks and
many other networks.

24. The standard for MAN is ___________ popularly known as ______________

25. Data can only be sent as?

26. Each port on a router is on the same collision domain. True/False?

27. Switches can connect networks to networks. True/False?

28. _______________ connects groups of computers and low-voltage devices together across
short distances (within a building or a group of two or three buildings) to share resources.

29. What connect two or more transmission lines?

30. All of the methods of communication have three things in common which are?

31. The Virtual LAN helps to separate network using ______________

32. Routers filter and forward data based on ___________

33. Process of communication involves;

34. _____________ is essentially a multiport network bridge and performs the same basic
functions as a bridge, but at faster speeds.

35. IEEE 802.3 is popularly known as ______________

36. Division of data stream into smaller pieces is called?

37. ___________________ are physical link addresses for every host device.

38. What relays packets of data between the wireless computers and also between them and
the internet?
39. The components of computer networks can be categorized into?

40. In a broadcast network packets of data are sent from a source to many destinations.
True/False

41. Router is an example of end device. True/False?

42. ______________ contains the unique address of the host and address of the receiver(s) on
the network.

43. What type of intermediary device provides connectivity to the network?

44. _____________ is an intra-layer communication entity.

45. What is the encapsulated data defined by the Network Access layer in the TCP/IP Model
and Data-link layer in the OSI Model?

46. What protocol is used to discover host's Internet address when it knows only its physical
address?

47. Mention the protocols that are in the presentation layer

48. What layer encompasses protocols which directly interact with the user?

49. _____________ is the network terminal protocol which provides login over the network

50. The three main functions of the data link layer are?

51. Which of the layers of the TCP/IP model defines the protocols for setting up the level of
transmission service for applications?

52. The protocols in Session layer are?


53. Direction of transmission may be simplex, full duplex and half duplex in what layer?

54. ____________ describes how network devices can format and transmit data packets to
other devices on the same Local Area.

55. What network hardware devices operate at the data link layer?

56. The PDU for the network layer is called?

57. What information are in the header of a packet?

58. Inter-layer communication happens through ____________

59. What keeps track of whose turn is it to transmit?

60. The protocol in the Application layer used for interactive file transfer on the internet is?

61. What layer is the network dialog controller?

62. In the layers of the TCP/IP model, the Transport layer is sometimes called the
____________

63. What protocol is used for assigning IP addresses to computers in a network.

64. All layers identify their counterparts by means of ________________________

65. The __________ layer transports data using electrical, mechanical or procedural interfaces.

66. The ________ layer specifies the intra-network operations and different types of addressing
and routing devices.

67. What does the UDP add to the data from the upper layer?

68. What OSI Model Layer acts as a translator between the application and the network?

69. The OSI Model Layers that are the responsibility of the host are?

70. Physical, Data-link and Transport layers of the OSI Model are the responsibility of the
network. True/False?

71. The header and trailer in the Data-link layer contains _____________ and _____________
which is used for ___________
72. What information are found in the header of a frame?

73. What protocol is used to associate IP Address to MAC Address?

74. What prevents two partied from attempting the same critical operations simultaneously?

75. What OSI Model layer is the closest to the end user?

76. What protocol converts the incoming data stream into smaller units called segments and
passes each one onto the internet layer?

77. What is the encapsulated data defined by the Transport layer?

78. Data-link layer of the OSI Model is responsible for Data encryption, Data decryption and
Data compression, Data decompression. True/False?

79. What layer is responsible for translation between different network types?

80. What information are found in the header of a segment?

81. What OSI layers are implemented in the hardware and software?

82. What hardware devices operate at layer 3?

83. The ____________ layer is responsible for end-to-end delivery of the entire message
between hosts.

84. Which layer in the TCP/IP model is responsible for reliable transmission of data and the
error-free delivery of packet?

85. The primary protocol used to transport data in packets is known as?

86. What is the encapsulated data defined by the Network layer?

87. Transmission media are also called ______________


88. ____________ defines the structure of the network of how all the components are
interconnected to each other.

89. The data in a ring topology flow is in what kind of direction?

90. What kind of access method works on "recovery after the collision"?

91. Guided Transmission is also referred to as ___________

92. The single cable in which all the stations are connected in a bus topology is known as?

93. What is the frequency range for Radiowaves?

94. Where are transmission media located?

95. The most common access method of the ring topology is?

96. What is the most widely used Transmission Media?

97. ______________ is the geometric representation of all the nodes in a network.

98. What kind of access method effectively reduces the possibility of the collision?

99. What type of cable consists of a special jacket to block external interference?

100. Bus topology happens on an unguided transmission. True/False?

101. What type of mode in coaxial cable is there limited bandwidth in which different signals
travel?

102. What kind of cables are used to connect dissimilar devices together?

103. UTP category 2 and 4 are ___________________ and _______________ respectively.

104. Bus topology is sometimes called _________________

105. The core that the optical fibre cable uses is surrounded by a less dense glass or plastic
covering called __________________

106. AM, FM and cordless phones use microwaves for their transmission. True/False?

107. What is the frequency range for microwaves?


108. Optical fibre cable can be ________________ or _________________

109. What type of transmission is used for smaller distances?

110. In a ring topology, _________ is used as a carrier.

111. The signal in unguided transmission media is broadcasted through?

112. ______________ illustrates how data flows within a network.

113. If the backbone breaks, the entire network fails. This is referred to as?

114. What is the frequency range for infrared?

115. What kind of cables are used to connect hubs to switches?


,
116. __________ is a media access control used to control the data flow so that data integrity is
maintained.

117. What type of signals is transmitted through TV remotes, wireless mouse and keyboard?

118. What type of topology mainly uses 802.3 (ethernet) and 802.4 standard networks?

119. Star topology is laid out so every node in the network is directly connected to one central
hub via _____________________

120. The central computer in star topology is known as ________

121. ________ is a network model designed for the end users called Clients, to access the
resources such as data from a central computer known as Server.

122. ___________ refers to the way network devices and services are structured to serve the
connectivity needs of client devices.

123. What topology is mainly used for wireless networks?

124. Key elements to consider when choosing the best topology for your network?

125. Peer-To-Peer network has a dedicated server. True/False


126. The peripheral attached to the central computer of star topology are known as
________________

127. What connection devices are mainly used in physical star topology?

128. When the nodes in mesh topology use logic to determine the shortest distance from the
source to destination, this means data is _______________

129. _________ is a network in which all the computers are linked together with equal privilege
and responsibilities for processing the data.

130. _________ topology combines the characteristics of bus topology and star topology.

131. __________ topology is often used for wide area networks to support many spread-out
devices.

132. ____________ topology is mainly used for WAN implementations where communication
failures are a critical concern.

133. All other nodes in tree topology are known as the ______________________

134. When the information is sent to all nodes within the network without the need for routing
logic, this means that data is __________

135. The top-most node in tree topology is known as a __________

136. The server in star topology functions as a ______________ which helps prevents data loss

137. Peer-to-peer networks are usually up to how many computers?

138. What are the four aspects of reliable delivery as part of the services provided by the
transport layer?

139. One of the advantages of mesh topology is that they are incredibly labour intensive.
True/False?

140. The entire network must be offline for devices to be added, removed or modified in star
topology. True/False?

141. What component of SMTP prepares the message, creates the envelope and then puts the
message in the envelope?
142. Mesh topology contains the switch, hub or any central computer which acts as a central
point of communication. True/False?

143. Through what type of connection in FTP, can we transfer a line of command or line of
response at a time? And this connection is made between ______________

144. Downtime occurs in star topology. True/False?

145. Since there is only one path exists between two nodes for the data transmission in tree
topology, it forms what kind of hierarchy?

146. The web-like structure of mesh topologies offers two different methods of data
transmission known as?

147. The transport layer protocols are implemented in the network routers. True/False?

148. In the data-link layer, the communication channel that connects the adjacent nodes is
known as?

149. The combination of two or more different topologies is known as?

150. A set of communication guidelines that allow software to transmit an electronic mail over
the internet is called

151. What protocol can be used to transfer the data in the form of plain text, hypertext, audio,
video, and so on?

152. The boundary between the host and link is known as?

153. What type of connection in FTP opens when a command comes for transferring the files
and closes when the file is transferred? And this connection is made between _________

154. _____________ is a process of selecting path along which the data can be transferred from
source to the destination.

155. SMTP messages are delivered immediately. True/False?

156. The first three octets in an IP address specifies ________________ address and the last octet
specifies the _______________ address

157. In a client/server network a server has what kind of OS to provide the resources to the
clients?
158. What layer translates the logical addresses into physical addresses?

159. In class A type of classful addressing, an IP address is assigned to those networks that range
from small-sized to large-sized networks. True/False?

160. What initializes and maintains the routing table for the process of path determination?

161. What protocol allows the users of networks to utilize user-friendly names when looking
for other hosts instead of remembering the IP addresses?

162. What topology is known as the topology of the internet?

163. The Datagram is handled by ___________ on the first link

164. What component of SMTP transfers this mail across the internet?

165. HTTP uses data connection to transfer files. True/False?

166. What layer provides a logical communication between application processes running on
different hosts?

167. What connects a link and a network?

168. ______________ is a technique in which the administrator manually adds the routes in a
routing table

169. Each IP address is how many bits long?

170. What are used for interconnectivity of networks?

171. The total number of networks in Class A type of classful addressing is?

172. What is a technique in which a router is configured to send all the packets to the same hop
device, and it doesn't matter whether it belongs to a particular network or not?

173. What organization is best known for its OSI Reference Model?

174. What refers to any technology that manages data traffic to reduce packet loss, latency and
jitter on the network?

175. What is a set of technologies that work on a network to guarantee its ability to
dependably run high priority applications and traffic under limited network capacity?
176. ______________ is the communications sector of the EIA, and is responsible for developing
communications standards.

177. The combined use of several media, such as images, movies, slides, audio, text and
lighting, especially for the purpose of education or entertainment is known as?

178. ______________ is a well-known professional organization for those in the electrical or


electronics fields, including computers and networking.

179. What organization responsible for coordinating and publishing computer and information
technology standards in the United States?

180. _____________ refers to building the multimedia on network and distributed systems, so
different users on different machines can share image, sound, video, voice and many other
features and to communicate with each other under these tools.

181. _____________ is an international industry association that is best known for publishing
electrical wiring and transmission standards.

182. _____________ was an early and famous example of P2P file sharing?

183. When a router is set up as an Access Point, it is said to be in what mode?

184. In Query Flooding Architecture, when the peer with requested file is found is known as?

185. What are electromagnetic waves travelling through the air?

186. When you are accessing a wireless hotspot, or the router in your home or office, your
device is the ____________

187. What are devices that host and control the wireless connection for laptops, tablets, or
smart phones?

188. What allows devices to connect together directly, without an Access Point in-between
controlling the connection?

189. ____________ can be defined as a communications network that is spread out over an
immense land area around the world, connected wirelessly by transceivers at fixed
locations that are known as cell sites or base stations.
190. ______________ is a way of connecting two nodes on a network to communicate with
each other.

191. Data is exchanged between the client and server using ___________ and _________ calls in
socket programming.

192. _________ call is used to associate the socket with a specific network interface and port
number.
193. __________ and ___________ are used to send messages across a network in socket
programming

194. In socket programming, ____________ forms the listening socket and ___________ reaches
out to what forms the listening socket.

195. When a client connects, the server calls _________ to accept or complete the connection,
then the clients calls _________ to establish a connection to the server and initiate the
three-way handshake.

You might also like